Sep 01, 2016 However, this did not change the status of the Endpoint Security on the computer - it still shows 'blacklist of keys corrupted' then changes to 'databases are corrupted' and 'protection disabled.' See screen shots - the first is from the server and shows the results of the Add key task'; the second is from the client and shows Kaspersky. I have a LAN and setup of around 50 computers with 1 admin server with Kaspersky security center 10 and all others as clients with endpoint security. This whole setup is completely isolated from internet and we cannot connect it to internet.
- Kaspersky Endpoint Security 10 Databases Are Corrupted Files
- Kaspersky Endpoint Security 10 Databases Are Corrupted People
- Kaspersky Endpoint Security 10 Databases Are Corrupted File
- Kaspersky Endpoint Security For Business 10
- Kaspersky Endpoint Security 10 Databases Are Corrupted Error
Processor32-bit processor: Intel Pentium 4 or equivalent minimum (minimum dual core or hyper-threading recommended)64-bit processor: Intel Pentium 4 with x86-64 support or equivalent minimum (minimum dual core or hyper-threading recommended) Note: Intel Itanium IA-64 processors are not supported. Physical RAM2 GB RAM available minimum; 4 GB RAM or more available recommended. Note: Your Symantec Endpoint Protection Manager server may require additional RAM depending on the RAM requirements of other applications that are already installed. Hard driveEnterprise version: 16 GB available minimum (100 GB recommended) for the management server; 40 GB available minimum (200 GB recommended) for the management server and a locally installed database.Small Business Edition: 16 GB available minimum; 100 GB available recommended.Display 1024 x 768Operating system
If an update was corrupted.try to manually update If manual updates fail.use the rollback feature within kaspersky. If you have done a system restore this can corrupt the database as well.changing time on PC etc can also cause some problems.
- Windows XP (32-bit, SP2 or later; 64-bit, all SPs; all editions except Home)
- Windows 7 (32-bit, 64-bit, RTM and SP1; all editions except Starter and Home)
- Windows 8 (32-bit, 64-bit)
- Windows 8.1 (32-bit, 64-bit)
- Windows 8.1 update for April 2014 (32-bit, 64-bit)
- Windows 8.1 update for August 2014 (32-bit, 64-bit)
- Windows Server 2003 (32-bit, 64-bit, R2, SP1 or later)
- Windows Server 2008 (32-bit, 64-bit, R2, RTM, SP1, and SP2)
- Windows Server 2012
- Windows Server 2012 R2
- Windows Server 2012 R2 update for April 2014
- Windows Server 2012 R2 update for August 2014
- Windows Small Business Server 2003 (32-bit)
- Windows Small Business Server 2008 (64-bit)
- Windows Small Business Server 2011 (64-bit)
- Windows Essential Business Server 2008 (64-bit)
Note: This Symantec Endpoint Protection Manager version manages clients earlier than version 12.1, regardless of the client operating system. Web browser
- Microsoft Internet Explorer 8, 9, 10, 10.2, 11
- Mozilla Firefox 3.6 through 31.0
- Google Chrome, through 37.0.2062.94
Note: This list of supported browsers applies to the Symantec Endpoint Protection Manager only. For a list of supported browsers for Browser Intrusion Prevention, see .Database Symantec Endpoint Protection Manager includes an embedded database, and this is the only choice in Small Business Edition. In the enterprise version, you may use the embedded database or one of the following versions of Microsoft SQL Server:
- SQL Server 2005, SP4
- SQL Server 2008, through SP4
- SQL Server 2008 R2, through SP3
- SQL Server 2012, through SP1
- SQL Server 2014
Virtual environmentYou can install and manage Symantec Endpoint Protection Manager on the supported operating systems that run in the following virtual environments:
- Windows Azure
- Amazon WorkSpaces
- VMware WS 5.0 (workstation) or later
- VMware GSX 3.2 (enterprise) or later
- VMware ESX 2.5 (workstation) or later
- VMware ESXi 4.1 – 5.5
- Microsoft Virtual Server 2005
- Microsoft Enterprise Desktop Virtualization (MED-V), which includes Windows XP mode
- Windows Server 2008 Hyper-V
- Windows Server 2012 Hyper-V
- Windows Server 2012 R2 Hyper-V
- Citrix XenServer 5.6 or later
- Virtual Box, supplied by Oracle
This article has been read 801 times.
endpoint security comparison chartendpoint security client
CATEGORIES
Learning has never been so easy!
That error message is misleading. I had a workstation show up in the Kaspersky Security Center status report as Protection is Off. That however was not the case after lots of troubleshooting.
4 Steps total
Step 1: Check the Application status in KSC
The application and network agent status showed running which of course means that real time monitoring is running. Vizrt crack activated version. I also restarted the KLNAGENT service on the local workstation to verify that it was communicating to KSC. Followed that up with a reboot. Still no change.
Step 2: Check the status of the tasks on the client
Launch the KSE 8 or 10 by clicking the icon in the system tray. I then took a look at the scheduled tasks and the update task showed failed - Black list of sites corrupted. I don't have a screen shot of the message, but it would be where you see Update, etc. I believe it also said that it had failed at 1% which is more or less upon initiation.
Kaspersky Endpoint Security 10 Databases Are Corrupted Files
Kaspersky Endpoint Security 10 Databases Are Corrupted People
Step 3: Clear the Bases
Ok, now you need to go to the following directory via Windows Explorer, --> C:ProgramDataKaspersky LabKES8Bases or %networkagentbases. The 8 can be substituted with 10 of course if you are running KES 10. I deleted all of the DAT, XML and XMS files in that directory. I left the sub directories intact.
Step 4: Manually Update Databases
Kaspersky Endpoint Security 10 Databases Are Corrupted File
I then went back into the KES application and manually started the Database update. Right Click update and then click Start Update. After completion of the update the Corruption message went away and showed the status you see above and it reported back as OK status.
Kaspersky Endpoint Security For Business 10
Published: Feb 04, 2015 · Last Updated: Feb 05, 2015